Blame crypto/ct/ct_prn.c

Packit c4476c
/*
Packit c4476c
 * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
Packit c4476c
 *
Packit c4476c
 * Licensed under the OpenSSL license (the "License").  You may not use
Packit c4476c
 * this file except in compliance with the License.  You can obtain a copy
Packit c4476c
 * in the file LICENSE in the source distribution or at
Packit c4476c
 * https://www.openssl.org/source/license.html
Packit c4476c
 */
Packit c4476c
Packit c4476c
#ifdef OPENSSL_NO_CT
Packit c4476c
# error "CT is disabled"
Packit c4476c
#endif
Packit c4476c
Packit c4476c
#include <openssl/asn1.h>
Packit c4476c
#include <openssl/bio.h>
Packit c4476c
Packit c4476c
#include "ct_local.h"
Packit c4476c
Packit c4476c
static void SCT_signature_algorithms_print(const SCT *sct, BIO *out)
Packit c4476c
{
Packit c4476c
    int nid = SCT_get_signature_nid(sct);
Packit c4476c
Packit c4476c
    if (nid == NID_undef)
Packit c4476c
        BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg);
Packit c4476c
    else
Packit c4476c
        BIO_printf(out, "%s", OBJ_nid2ln(nid));
Packit c4476c
}
Packit c4476c
Packit c4476c
static void timestamp_print(uint64_t timestamp, BIO *out)
Packit c4476c
{
Packit c4476c
    ASN1_GENERALIZEDTIME *gen = ASN1_GENERALIZEDTIME_new();
Packit c4476c
    char genstr[20];
Packit c4476c
Packit c4476c
    if (gen == NULL)
Packit c4476c
        return;
Packit c4476c
    ASN1_GENERALIZEDTIME_adj(gen, (time_t)0,
Packit c4476c
                             (int)(timestamp / 86400000),
Packit c4476c
                             (timestamp % 86400000) / 1000);
Packit c4476c
    /*
Packit c4476c
     * Note GeneralizedTime from ASN1_GENERALIZETIME_adj is always 15
Packit c4476c
     * characters long with a final Z. Update it with fractional seconds.
Packit c4476c
     */
Packit c4476c
    BIO_snprintf(genstr, sizeof(genstr), "%.14s.%03dZ",
Packit c4476c
                 ASN1_STRING_get0_data(gen), (unsigned int)(timestamp % 1000));
Packit c4476c
    if (ASN1_GENERALIZEDTIME_set_string(gen, genstr))
Packit c4476c
        ASN1_GENERALIZEDTIME_print(out, gen);
Packit c4476c
    ASN1_GENERALIZEDTIME_free(gen);
Packit c4476c
}
Packit c4476c
Packit c4476c
const char *SCT_validation_status_string(const SCT *sct)
Packit c4476c
{
Packit c4476c
Packit c4476c
    switch (SCT_get_validation_status(sct)) {
Packit c4476c
    case SCT_VALIDATION_STATUS_NOT_SET:
Packit c4476c
        return "not set";
Packit c4476c
    case SCT_VALIDATION_STATUS_UNKNOWN_VERSION:
Packit c4476c
        return "unknown version";
Packit c4476c
    case SCT_VALIDATION_STATUS_UNKNOWN_LOG:
Packit c4476c
        return "unknown log";
Packit c4476c
    case SCT_VALIDATION_STATUS_UNVERIFIED:
Packit c4476c
        return "unverified";
Packit c4476c
    case SCT_VALIDATION_STATUS_INVALID:
Packit c4476c
        return "invalid";
Packit c4476c
    case SCT_VALIDATION_STATUS_VALID:
Packit c4476c
        return "valid";
Packit c4476c
    }
Packit c4476c
    return "unknown status";
Packit c4476c
}
Packit c4476c
Packit c4476c
void SCT_print(const SCT *sct, BIO *out, int indent,
Packit c4476c
               const CTLOG_STORE *log_store)
Packit c4476c
{
Packit c4476c
    const CTLOG *log = NULL;
Packit c4476c
Packit c4476c
    if (log_store != NULL) {
Packit c4476c
        log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id,
Packit c4476c
                                         sct->log_id_len);
Packit c4476c
    }
Packit c4476c
Packit c4476c
    BIO_printf(out, "%*sSigned Certificate Timestamp:", indent, "");
Packit c4476c
    BIO_printf(out, "\n%*sVersion   : ", indent + 4, "");
Packit c4476c
Packit c4476c
    if (sct->version != SCT_VERSION_V1) {
Packit c4476c
        BIO_printf(out, "unknown\n%*s", indent + 16, "");
Packit c4476c
        BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len);
Packit c4476c
        return;
Packit c4476c
    }
Packit c4476c
Packit c4476c
    BIO_printf(out, "v1 (0x0)");
Packit c4476c
Packit c4476c
    if (log != NULL) {
Packit c4476c
        BIO_printf(out, "\n%*sLog       : %s", indent + 4, "",
Packit c4476c
                   CTLOG_get0_name(log));
Packit c4476c
    }
Packit c4476c
Packit c4476c
    BIO_printf(out, "\n%*sLog ID    : ", indent + 4, "");
Packit c4476c
    BIO_hex_string(out, indent + 16, 16, sct->log_id, sct->log_id_len);
Packit c4476c
Packit c4476c
    BIO_printf(out, "\n%*sTimestamp : ", indent + 4, "");
Packit c4476c
    timestamp_print(sct->timestamp, out);
Packit c4476c
Packit c4476c
    BIO_printf(out, "\n%*sExtensions: ", indent + 4, "");
Packit c4476c
    if (sct->ext_len == 0)
Packit c4476c
        BIO_printf(out, "none");
Packit c4476c
    else
Packit c4476c
        BIO_hex_string(out, indent + 16, 16, sct->ext, sct->ext_len);
Packit c4476c
Packit c4476c
    BIO_printf(out, "\n%*sSignature : ", indent + 4, "");
Packit c4476c
    SCT_signature_algorithms_print(sct, out);
Packit c4476c
    BIO_printf(out, "\n%*s            ", indent + 4, "");
Packit c4476c
    BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
Packit c4476c
}
Packit c4476c
Packit c4476c
void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
Packit c4476c
                    const char *separator, const CTLOG_STORE *log_store)
Packit c4476c
{
Packit c4476c
    int sct_count = sk_SCT_num(sct_list);
Packit c4476c
    int i;
Packit c4476c
Packit c4476c
    for (i = 0; i < sct_count; ++i) {
Packit c4476c
        SCT *sct = sk_SCT_value(sct_list, i);
Packit c4476c
Packit c4476c
        SCT_print(sct, out, indent, log_store);
Packit c4476c
        if (i < sk_SCT_num(sct_list) - 1)
Packit c4476c
            BIO_printf(out, "%s", separator);
Packit c4476c
    }
Packit c4476c
}